Software Development Security Flashcards

1
Q

Adware

A

Software to generate ads that installs itself on your computer when you download some other (usually free) program from the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aggregation

A

A relation, such as CONSISTS OF or CONTAINS, between types that defines the composition of a type from other types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Programming Interface (API)

A

A set of calling conventions defining how a service is invoked through a software package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnets

A

A network of infected zombie computers controlled by a botherder. Botnets range in size from a just handful of infected computers to hundreds of thousands or millions. Also known as botherd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer overflow

A

An anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and ovewrites adjacent memory. This is a special case of violation of memory safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cookie poisoning (manipulation)

A

Attacks involving the modification of the contents of a cookie in order to bypass security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Covert channel

A

A channel of communication within a computer system, or network, that is not designed or intended to transfer information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cross Site Request Forgeries (CSRF)

A

A type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cross-Site Scripting (XSS)

A

A type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dangling pointer

A

Pointers that do not point to a valid object of the appropriate type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data hiding

A

A software development technique specifically used in object-oriented programming (OOP) to hide internal object details (data members). Data hiding ensures exclusive data access to class members and protects object integrity by preventing unintended or intended changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service (DoS)

A

The unauthorized prevention of authorized access to resources or the delaying of time-critical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial of Service (DDoS)

A

Multiple computers flooding a Web site with so many requests for service that it slows down or crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fast flux botnets

A

A DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Garbage collection

A

A language mechanism that automatically deallocates memory for objects that are not accessible or referenced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP Response Splitting

A

A form of web application vulnerability, resulting from the failure of the application or its environment to properly sanitize input values. It can be used to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits.

17
Q

Keystroke logging

A

The action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

18
Q

Open source

A

A philosophy that promotes free redistribution and access to an end product’s design and implementation details.

19
Q

Pharming

A

An attack intended to redirect a website’s traffic to another, bogus site.

20
Q

Phishing

A

The act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly money) by masquerading as a trustworthy entity in an electronic communication.

21
Q

Race condition

A

A type of flaw in an electronic or software system where the output is dependent on the sequence or timing of other uncontrollable events.

22
Q

Remote Access Trojans (RATs)

A

A malware program that includes a back door for administrative control over the target computer.

23
Q

Rootkits

A

A stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.

24
Q

Social engineering

A

The art of manipulating people into performing actions or divulging confidential information.

25
Q

SPAM

A

The use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately.

26
Q

Spear phishing

A

Phishing attempts directed at specific individuals or companies. Attackers may gather personal information about their target to increase their probability of success.

27
Q

SQL injection

A

A technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g. dump the database contents to the attacker).

28
Q

URL manipulation

A

By manipulating certain parts of a URL, a hacker can get a web server to deliver web pages he is not supposed to have access to.

29
Q

Web applets

A

Provide interactive features to web applications that cannot be provided by HTML alone. They can capture mouse input and also have controls like buttons or check boxes. In response to the user action an applet can change the provided graphic content.